A model for accomplishing and managing dynamic cloud federations

G Andronico, M Fargetta, S Monforte… - 2014 IEEE/ACM 7th …, 2014 - ieeexplore.ieee.org
Cloud computing is not just a promising approach to the service provisioning: nowadays it
represents the reference model in such field. Several cloud service providers have emerged …

Multi cloud iaas with domain trust in openstack

N Pustchi, F Patwa, R Sandhu - … of the Sixth ACM Conference on Data …, 2016 - dl.acm.org
As cloud services have been firmly accepted by enterprises, the current challenge is how to
share these resources among increasing number of cloud platforms. Currently, cloud …

Integrating an AAA‐based federation mechanism for OpenStack—the CLASSe view

A Pérez Méndez, G López Millán… - Concurrency and …, 2017 - Wiley Online Library
Identity federations enable users, service providers, and identity providers from different
organizations to exchange authentication and authorization information in a secure way. In …

Constructing virtual network attack and defense platform based on openstack

L Lian, Y Zhang, H Zhang, S Zhang - … International Conference on …, 2015 - atlantis-press.com
With the rapid development of Internet, network security issues have become great issues
related to national security and stability. In this context, researchers and students in …

Decentralized authentication method for accessing pedagogical resources in a cloud computing based virtual organization

AD Gueye, S Ouya, C Lishou, I Sanogo… - 2014 International …, 2014 - ieeexplore.ieee.org
Today, more and more researchers are advocating the use of Clouds to form a virtual
organization. However, the implementation of a cloud based virtual organization presents …

IoT Cloud Security Design Patterns

BC Chifor, ȘC Arseni, I Bica - Big Data Platforms and Applications: Case …, 2021 - Springer
Abstract Internet-of-Things (IoT) devices are getting increasingly popular, becoming a core
element for the next generations of informational architectures: Smart City, Smart Factory …

Private cloud per la ricerca: implementazione di una regione OpenStack basata sul modello federato GARR= Private cloud for research: implementation of an …

P Belmonte - 2023 - webthesis.biblio.polito.it
I dati della diffusione del cloud computing in Europa e in Italia mostrano che questa
tecnologia¿ in una fase di piena maturit¿. La trasformazione innescata dai nuovi modelli ha …

A scheme for DDoS attacks mitigation in IdM systems through reorganizations

R Macedo, A Santos… - NOMS 2016-2016 …, 2016 - ieeexplore.ieee.org
Identity management (IdM) systems employ Identity Providers (IdPs), as guardians of users'
critical information. However, Distributed Denial-of-Service (DDoS) attacks can make IdPs …

Big Iron, Big Data, and Big Identity

CA Lee, M Assis, LF Bittencourt, S Nativi… - New Frontiers in …, 2017 - ebooks.iospress.nl
Abstract While High-Performance Computing (HPC) typically focuses on very large, parallel
machines, ie, Big Iron, running massive numerical codes, the importance of extracting …

[PDF][PDF] Identify cloud security weakness related to authentication and identity management (IAM) using openstack keystone model

N Abdulla, E Erçelebi - International Conference on Engineering …, 2017 - academicfora.com
The security of cloud system is one of the most important weakness in current cloud system,
in this work we were able to produce a solution for two problem in current OpenStack …